Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-05-2021 02:27
Static task
static1
Behavioral task
behavioral1
Sample
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe
Resource
win10v20210408
General
-
Target
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe
-
Size
3.3MB
-
MD5
e9865c0cab1852f3c71aaa95ee93569e
-
SHA1
52a7b9ab1dba3a1ccb25cf878ca65e9c10d86e7c
-
SHA256
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8
-
SHA512
4d92f74a3c4e591fd8cc040961a290fb6b81abd7d5bde165fa21f4ef2291176440d10b3e559474d0e9ea1b5cb0a83e9af7790187d6b8036ab011060ca0c1dd15
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
HelpMe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\HelpMe.exe aspack_v212_v242 C:\Windows\SysWOW64\HelpMe.exe aspack_v212_v242 C:\$Recycle.Bin\S-1-5-21-1594587808-2047097707-2163810515-1000\desktop.ini.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
HelpMe.exepid process 3028 HelpMe.exe -
Drops startup file 2 IoCs
Processes:
HelpMe.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HelpMe.exedescription ioc process File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\F: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory 4 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exeHelpMe.exedescription ioc process File opened for modification C:\Windows\SysWOW64\HelpMe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe File created C:\Windows\SysWOW64\notepad.exe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe File created C:\Windows\SysWOW64\HelpMe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Drops file in Program Files directory 1 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exepid process 2544 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe 2544 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exedescription pid process target process PID 2544 wrote to memory of 3028 2544 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe HelpMe.exe PID 2544 wrote to memory of 3028 2544 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe HelpMe.exe PID 2544 wrote to memory of 3028 2544 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe HelpMe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe"C:\Users\Admin\AppData\Local\Temp\e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops startup file
- Enumerates connected drives
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-1594587808-2047097707-2163810515-1000\desktop.ini.exeMD5
56b1c7012f7edc2ab04ad9cbb80158c2
SHA1681d8f98ef243cc0ff8dbfc088990be09d919afb
SHA256edb5d427619d10eb26957e82809317bea7a8c1aed5d27ad74f7df0517b58dd3d
SHA512c5f8d7348cb169e4bfac45a08ea26be0e5f760984bdbbbce2d2c338d87180d32f77534ed065b3c7444b7176c4fbfbb01cc1cc816ce8afe97ed6dc742b2917252
-
C:\Windows\SysWOW64\HelpMe.exeMD5
2ad6debbfe83736d5daec29c1665e66a
SHA1d363121edf8ff81e585f9d2b5786bf697280afa9
SHA25695a0f0c116d51a6c371e52b4f22b9775d10f9fef69aceadb981ca2c53101591a
SHA51291ea5169508df3de2281aa977881a59a78e99ab32084b4758ef2ea55a25a38ad75c68d2f1aa240b6e31bf310f827de6e0424b26149a9256fada9393e6dd4f80e
-
C:\Windows\SysWOW64\HelpMe.exeMD5
2ad6debbfe83736d5daec29c1665e66a
SHA1d363121edf8ff81e585f9d2b5786bf697280afa9
SHA25695a0f0c116d51a6c371e52b4f22b9775d10f9fef69aceadb981ca2c53101591a
SHA51291ea5169508df3de2281aa977881a59a78e99ab32084b4758ef2ea55a25a38ad75c68d2f1aa240b6e31bf310f827de6e0424b26149a9256fada9393e6dd4f80e
-
memory/2544-117-0x0000000000610000-0x0000000000611000-memory.dmpFilesize
4KB
-
memory/3028-114-0x0000000000000000-mapping.dmp
-
memory/3028-118-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB